phr icon indicating copy to clipboard operation
phr copied to clipboard

Bump the bundler group across 1 directory with 7 updates

Open dependabot[bot] opened this issue 3 months ago • 0 comments

Bumps the bundler group with 3 updates in the /def directory: nokogiri, globalid and request_store.

Updates nokogiri from 1.8.1 to 1.18.9

Release notes

Sourced from nokogiri's releases.

v1.18.9 / 2025-07-20

Security

  • [CRuby] Applied upstream libxml2 patches to address CVE-2025-6021, CVE-2025-6170, CVE-2025-49794, CVE-2025-49795, and CVE-2025-49796. See GHSA-353f-x4gh-cqq8 for more information.
5bcfdf7aa8d1056a7ad5e52e1adffc64ef53d12d0724fbc6f458a3af1a4b9e32  nokogiri-1.18.9-aarch64-linux-gnu.gem
55e9e6ca46c4ad1715e313f407d8481d15be1e3b65d9f8e52ba1c124d01676a7  nokogiri-1.18.9-aarch64-linux-musl.gem
eea3f1f06463ff6309d3ff5b88033c4948d0da1ab3cc0a3a24f63c4d4a763979  nokogiri-1.18.9-arm64-darwin.gem
fe611ae65880e445a9c0f650d52327db239f3488626df4173c05beafd161d46e  nokogiri-1.18.9-arm-linux-gnu.gem
935605e14c0ba17da18d203922440bf6c0676c602659278d855d4622d756a324  nokogiri-1.18.9-arm-linux-musl.gem
ac5a7d93fd0e3cef388800b037407890882413feccca79eb0272a2715a82fa33  nokogiri-1.18.9.gem
1fe5b7aa4a054eda689a969bb4e03999960a6ea806582d327207d687168bceb5  nokogiri-1.18.9-java.gem
6b4fc1523aa0370c78653e38c94cb50e7f3ab786425de66ba7ad24222c1164a3  nokogiri-1.18.9-x64-mingw-ucrt.gem
e0d2deb03d3d7af8016e8c9df5ff4a7d692159cefb135cbb6a4109f265652348  nokogiri-1.18.9-x86_64-darwin.gem
b52f5defedc53d14f71eeaaf990da66b077e1918a2e13088b6a96d0230f44360  nokogiri-1.18.9-x86_64-linux-gnu.gem
e69359d6240c17e64cc9f43970d54f13bfc7b8cc516b819228f687e953425e69  nokogiri-1.18.9-x86_64-linux-musl.gem

v1.18.8 / 2025-04-21

Security

  • [CRuby] Vendored libxml2 is updated to v2.13.8 to address CVE-2025-32414 and CVE-2025-32415. See GHSA-5w6v-399v-w3cc for more information.
36badd2eb281fca6214a5188e24a34399b15d89730639a068d12931e2adc210e  nokogiri-1.18.8-aarch64-linux-gnu.gem
664e0f9a77a7122a66d6c03abba7641ca610769a4728db55ee1706a0838b78a2  nokogiri-1.18.8-aarch64-linux-musl.gem
483b5b9fb33653f6f05cbe00d09ea315f268f0e707cfc809aa39b62993008212  nokogiri-1.18.8-arm64-darwin.gem
17de01ca3adf9f8e187883ed73c672344d3dbb3c260f88ffa1008e8dc255a28e  nokogiri-1.18.8-arm-linux-gnu.gem
6e6d7e71fc39572bd613a82d528cf54392c3de1ba5ce974f05c832b8187a040b  nokogiri-1.18.8-arm-linux-musl.gem
8c7464875d9ca7f71080c24c0db7bcaa3940e8be3c6fc4bcebccf8b9a0016365  nokogiri-1.18.8.gem
41002596960ff854198a20aaeb34cff0d445406d5ad85ba7ca9c3fd0c8f03de0  nokogiri-1.18.8-java.gem
11ab0f76772c5f2d718fb253fca5b74c6ef7628b72bbf8deba6ab1ffc93344cf  nokogiri-1.18.8-x64-mingw-ucrt.gem
024cdfe7d9ae3466bba6c06f348fb2a8395d9426b66a3c82f1961b907945cc0c  nokogiri-1.18.8-x86_64-darwin.gem
4a747875db873d18a2985ee2c320a6070c4a414ad629da625fbc58d1a20e5ecc  nokogiri-1.18.8-x86_64-linux-gnu.gem
ddd735fba49475a395b9ea793bb6474e3a3125b89960339604d08a5397de1165  nokogiri-1.18.8-x86_64-linux-musl.gem

v1.18.7 / 2025-03-31

Dependencies

... (truncated)

Changelog

Sourced from nokogiri's changelog.

v1.18.9 / 2025-07-20

Security

  • [CRuby] Applied upstream libxml2 patches to address CVE-2025-6021, CVE-2025-6170, CVE-2025-49794, CVE-2025-49795, and CVE-2025-49796. See GHSA-353f-x4gh-cqq8 for more information.

v1.18.8 / 2025-04-21

Security

  • [CRuby] Vendored libxml2 is updated to v2.13.8 to address CVE-2025-32414 and CVE-2025-32415. See GHSA-5w6v-399v-w3cc for more information.

v1.18.7 / 2025-03-31

Dependencies

  • [CRuby] Vendored libxml2 is updated to v2.13.7, which is a bugfix release.

v1.18.6 / 2025-03-24

Fixed

  • [JRuby] In HTML documents, Node#attribute now returns the correct attribute. This has been broken, and returning nil, since v1.17.0. (#3487) @​flavorjones

v1.18.5 / 2025-03-19

Fixed

v1.18.4 / 2025-03-14

Security

  • [CRuby] Vendored libxslt is updated to v1.1.43 to address CVE-2025-24855 and CVE-2024-55549. See GHSA-mrxw-mxhj-p664 for more information.

v1.18.3 / 2025-02-18

Security

  • [CRuby] Vendored libxml2 is updated v2.13.6 to address CVE-2025-24928 and CVE-2024-56171. See GHSA-vvfq-8hwr-qm4m for more information.

v1.18.2 / 2024-01-19

... (truncated)

Commits
  • 1dcd8ce version bump to v1.18.9
  • a05d2b4 Apply upstream patches to address multiple vulnerabilities (#3526)
  • 947a55e Apply upstream patches to address multiple vulnerabilities
  • 9187f4a version bump to v1.18.8
  • 1deea04 dep: libxml2 to v2.13.8 (branch v1.18.x) (#3509)
  • 6457fe6 dep: libxml2 to v2.13.8
  • 13e8aa4 version bump to v1.18.7
  • 605699d dep: bump libxml2 to 2.13.7 (v1.18.x backport) (#3495)
  • 804e590 dep: bump libxml2 to 2.13.7
  • 52bf15b dep(dev): drop Rubocop from JRuby deps
  • Additional commits viewable in compare view

Updates globalid from 0.4.1 to 1.0.1

Release notes

Sourced from globalid's releases.

v1.0.1

Possible ReDoS based DoS vulnerability in GlobalID

There is a ReDoS based DoS vulnerability in the GlobalID gem. This vulnerability has been assigned the CVE identifier CVE-2023-22799.

Versions Affected: >= 0.2.1 Not affected: NOTAFFECTED Fixed Versions: 1.0.1

Impact

There is a possible DoS vulnerability in the model name parsing section of the GlobalID gem. Carefully crafted input can cause the regular expression engine to take an unexpected amount of time. All users running an affected release should either upgrade or use one of the workarounds immediately.

Releases

The FIXED releases are available at the normal locations.

Workarounds

There are no feasible workarounds for this issue.

Credits

Thank you ooooooo_k for reporting this!

1.0.0

Stable API release.

The code is the same as the 0.6.0 release.

0.6.0

  • Add ActiveRecord::FixtureSet.signed_global_id helper to generate signed ids inside fixtures.

v0.5.2

  • Add back Ruby 2.5 support so gem install rails works out of the box, thereby satisfying Rails' Ruby version requirement. See rails/rails#42931

v0.5.1

  • New: Allow expiration to be turned off globally rails/globalid#128
  • Fixed: Support for ruby-head rails/globalid#132
  • Maintainance: Drop support for EOL'ed Rubies (< 2.6.0) and Rails 4.2

v0.4.2

... (truncated)

Commits
  • 574b99f Bump version for release
  • 4a75ecb Fix ReDoS vulnerability in name parsing
  • 42f5ea6 Prepare for 1.0.0
  • beab3e4 Prepare to 0.6.0
  • 29e12cb Upgrade all development gems
  • c894a43 Add devcontainer to allow contributors to have a working environment
  • b3ec8b9 Move ActiveRecord::FixtureSet.signed_global_id to this gem
  • e9d6ed9 Merge pull request #137 from rails/dependabot/bundler/nokogiri-1.12.5
  • a565d31 Bump nokogiri from 1.11.7 to 1.12.5
  • 9b1a4d2 Why u no love me?
  • Additional commits viewable in compare view

Updates loofah from 2.1.1 to 2.24.1

Release notes

Sourced from loofah's releases.

2.24.1 / 2025-05-12

Ruby support

2.24.0 / 2024-12-24

Added

Improved

  • Built-in scrubber :targetblank now skips a tags whose href attribute is an anchor link. Previously, all a tags were modified to have target='_blank'. #291 @​fnando

New Contributors

Full Changelog: https://github.com/flavorjones/loofah/compare/v2.23.1...v2.24.0

2.23.1 / 2024-10-25

Added

Full Changelog: https://github.com/flavorjones/loofah/compare/v2.23.0...v2.23.1

2.23.0 / 2024-10-24

Added

New Contributors

Full Changelog: https://github.com/flavorjones/loofah/compare/v2.22.0...v2.23.0

2.22.0 / 2023-11-13

Added

... (truncated)

Changelog

Sourced from loofah's changelog.

2.24.1 / 2025-05-12

Ruby support

2.24.0 / 2024-12-24

Added

Improved

  • Built-in scrubber :targetblank now skips a tags whose href attribute is an anchor link. Previously, all a tags were modified to have target='_blank'. #291 @​fnando

2.23.1 / 2024-10-25

Added

2.23.0 / 2024-10-24

Added

2.22.0 / 2023-11-13

Added

2.21.4 / 2023-10-10

Fixed

  • Loofah::HTML5::Scrub.scrub_css is more consistent in preserving whitespace (and lack of whitespace) in CSS property values. In particular, .scrub_css no longer inserts whitespace between tokens that did not already have whitespace between them. [#273, fixes #271]

2.21.3 / 2023-05-15

Fixed

... (truncated)

Commits
  • 6cadc8a version bump to v2.24.1
  • 6970d9b Merge pull request #297 from flavorjones/flavorjones/ci-matrix-202505
  • e906a74 ci: add jruby 10 and jruby head, bump ruby versions for jobs
  • 4f3f606 Merge pull request #296 from Earlopain/cgi-ruby-3.5
  • 7094f04 Only load what is required from cgi
  • 8599060 version bump to v2.24.0
  • 2abdafc Merge pull request #284 from josecolella/jc-th-add-breakpoint-scrubber
  • 4d94183 Drop newlines from the double-breakpoint test
  • 4b339a5 docs: Update documentation
  • 9da4c19 feat: Add implementation for method
  • Additional commits viewable in compare view

Updates rack from 2.2.2 to 2.2.19

Release notes

Sourced from rack's releases.

v2.2.8.1

What's Changed

  • Fixed ReDoS in Accept header parsing [CVE-2024-26146]
  • Fixed ReDoS in Content Type header parsing [CVE-2024-25126]
  • Reject Range headers which are too large [CVE-2024-26141]

Full Changelog: https://github.com/rack/rack/compare/v2.2.8...v2.2.8.1

v2.2.8

What's Changed

New Contributors

Full Changelog: https://github.com/rack/rack/compare/v2.2.7...v2.2.8

v2.2.7

What's Changed

New Contributors

Full Changelog: https://github.com/rack/rack/compare/v2.2.6.4...v2.2.7

v2.2.6.4

No release notes provided.

Changelog

Sourced from rack's changelog.

[2.2.19] - 2025-10-07

Security

  • CVE-2025-61772 Multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion)
  • CVE-2025-61771 Multipart parser buffers large non‑file fields entirely in memory, enabling DoS (memory exhaustion)
  • CVE-2025-61770 Unbounded multipart preamble buffering enables DoS (memory exhaustion)

[2.2.18] - 2025-09-25

Security

  • CVE-2025-59830 Unbounded parameter parsing in Rack::QueryParser can lead to memory exhaustion via semicolon-separated parameters.

[2.2.17] - 2025-06-03

[2.2.16] - 2025-05-22

[2.2.15] - 2025-05-18

[2.2.14] - 2025-05-06

:warning: This release includes a security fix that may cause certain routes in previously working applications to fail if query parameters exceed 4,096 in count or 4 MB in total size. See https://github.com/rack/rack/discussions/2356 for more details.

Security

  • CVE-2025-46727 Unbounded parameter parsing in Rack::QueryParser can lead to memory exhaustion.

[2.2.13] - 2025-03-11

Security

[2.2.12] - 2025-03-04

Security

[2.2.11] - 2025-02-12

Security

... (truncated)

Commits
  • 4c4ea29 Bump patch version.
  • c370dcd Limit amount of retained data when parsing multipart requests
  • d869fed Fix denial of service vulnerbilties in multipart parsing
  • 0f76d43 Bump patch version.
  • 493a411 Fix thin integration.
  • 54e4ffd Unbounded parameter parsing in Rack::QueryParser.
  • 9163ac3 Bump patch version.
  • 8e52d2a Backport #2263 to v2.2, fix: malformed charset param (#2338)
  • 2a32eca Bump patch version.
  • 034a13c Change CGI::Cookie.new to Cookie.new (#2335)
  • Additional commits viewable in compare view

Updates rails-html-sanitizer from 1.0.3 to 1.6.2

Release notes

Sourced from rails-html-sanitizer's releases.

v1.6.2 / 2024-12-12

  • PermitScrubber fully supports frozen "allowed tags".

    v1.6.1 introduced safety checks that may remove unsafe tags from the allowed list, which introduced a regression for applications passing a frozen array of allowed tags. Tags and attributes are now properly copied when they are passed to the scrubber.

    Fixes #195.

    Mike Dalessio

1.6.1 / 2024-12-02

This is a performance and security release which addresses several possible XSS vulnerabilities.

... (truncated)

Changelog

Sourced from rails-html-sanitizer's changelog.

v1.6.2 / 2024-12-12

  • PermitScrubber fully supports frozen "allowed tags".

    v1.6.1 introduced safety checks that may remove unsafe tags from the allowed list, which introduced a regression for applications passing a frozen array of allowed tags. Tags and attributes are now properly copied when they are passed to the scrubber.

    Fixes #195.

    Mike Dalessio

1.6.1 / 2024-12-02

This is a performance and security release which addresses several possible XSS vulnerabilities.

  • The dependency on Nokogiri is updated to v1.15.7 or >=1.16.8.

    This change addresses CVE-2024-53985 (GHSA-w8gc-x259-rc7x).

    Mike Dalessio

  • Disallowed tags will be pruned when they appear in foreign content (i.e. SVG or MathML content), regardless of the prune: option value. Previously, disallowed tags were "stripped" unless the gem was configured with the prune: true option.

    The CVEs addressed by this change are:

    • CVE-2024-53986 (GHSA-638j-pmjw-jq48)
    • CVE-2024-53987 (GHSA-2x5m-9ch4-qgrr)

    Mike Dalessio

  • The tags "noscript", "mglyph", and "malignmark" will not be allowed, even if explicitly added to the allowlist. If applications try to allow any of these tags, a warning is emitted and the tags are removed from the allow-list.

    The CVEs addressed by this change are:

    • CVE-2024-53988 (GHSA-cfjx-w229-hgx5)
    • CVE-2024-53989 (GHSA-rxv5-gxqc-xx8g)

    Please note that we may restore support for allowing "noscript" in a future release. We do not expect to ever allow "mglyph" or "malignmark", though, especially since browser support is minimal for these tags.

    Mike Dalessio

  • Improve performance by eliminating needless operations on attributes that are being removed. #188

... (truncated)

Commits
  • 9160d49 version bump to v1.6.2
  • 5843d4d fix: PermitScrubber accepts frozen tags
  • 5e96b19 version bump to v1.6.1
  • 383cc7c doc: update CHANGELOG with assigned CVEs
  • a7b0cfe Combine the noscript/mglyph prevention blocks
  • 5658335 Merge branch 'h1-2509647-noscript' into flavorjones-2024-security-fixes
  • 65fb72f Merge branch 'h1-2519936-mglyph-foster-parenting' into flavorjones-2024-secur...
  • 3fe22a8 Merge branch 'h1-2519936-foreign-ns-confusion' into flavorjones-2024-security...
  • d7a94c1 Merge branch 'h1-2503220-nokogiri-serialization' into flavorjones-2024-securi...
  • 3fd6e65 doc: update CHANGELOG
  • Additional commits viewable in compare view

Updates request_store from 1.3.2 to 1.4.0

Commits
  • 6a0f3c9 Bump to 1.4.0
  • 44e2c6a clean up readme formatting
  • 28c000a fix travis by forgetting about rbx2
  • a2e081f Merge pull request #52 from aasmith/master
  • 9fd2fcc Merge pull request #54 from madebylotus/feature/update-readme-with-info-on-si...
  • 9ba87b8 Adds mention of using RequestStore with Sidekiq
  • 0fa2c76 Support Ruby 1.8.
  • 05dd59d Ensure the request store is active during a streamed response.
  • 1103250 Clear the request store on teardown between tests.
  • See full diff in compare view

Updates tzinfo from 1.2.4 to 1.2.11

Release notes

Sourced from tzinfo's releases.

v1.2.11

  • Eliminate Object#untaint deprecation warnings on JRuby 9.4.0.0. #145.

TZInfo v1.2.11 on RubyGems.org

v1.2.10

TZInfo v1.2.10 on RubyGems.org

v1.2.9

  • Fixed an incorrect InvalidTimezoneIdentifier exception raised when loading a zoneinfo file that includes rules specifying an additional transition to the final defined offset (for example, Africa/Casablanca in version 2018e of the Time Zone Database). #123.

TZInfo v1.2.9 on RubyGems.org

v1.2.8

  • Added support for handling "slim" format zoneinfo files that are produced by default by zic version 2020b and later. The POSIX-style TZ string is now used calculate DST transition times after the final defined transition in the file. The 64-bit section is now always used regardless of whether Time has support for 64-bit times. #120.
  • Rubinius is no longer supported.

TZInfo v1.2.8 on RubyGems.org

v1.2.7

  • Fixed 'wrong number of arguments' errors when running on JRuby 9.0. #114.
  • Fixed warnings when running on Ruby 2.8. #112.

TZInfo v1.2.7 on RubyGems.org

v1.2.6

  • Timezone#strftime('%s', time) will now return the correct number of seconds since the epoch. #91.
  • Removed the unused TZInfo::RubyDataSource::REQUIRE_PATH constant.
  • Fixed "SecurityError: Insecure operation - require" exceptions when loading data with recent Ruby releases in safe mode.
  • Fixed warnings when running on Ruby 2.7. #106 and #111.

TZInfo v1.2.6 on RubyGems.org

v1.2.5

  • Support recursively (deep) freezing Country and Timezone instances. #80.
  • Allow negative daylight savings time offsets to be derived when reading from zoneinfo files. The utc_offset and std_offset are now derived correctly for Europe/Dublin in the 2018a and 2018b releases of the Time Zone Database.

TZInfo v1.2.5 on RubyGems.org

Changelog

Sourced from tzinfo's changelog.

Version 1.2.11 - 28-Jan-2023

  • Eliminate Object#untaint deprecation warnings on JRuby 9.4.0.0. #145.

Version 1.2.10 - 19-Jul-2022

Version 1.2.9 - 16-Dec-2020

  • Fixed an incorrect InvalidTimezoneIdentifier exception raised when loading a zoneinfo file that includes rules specifying an additional transition to the final defined offset (for example, Africa/Casablanca in version 2018e of the Time Zone Database). #123.

Version 1.2.8 - 8-Nov-2020

  • Added support for handling "slim" format zoneinfo files that are produced by default by zic version 2020b and later. The POSIX-style TZ string is now used calculate DST transition times after the final defined transition in the file. The 64-bit section is now always used regardless of whether Time has support for 64-bit times. #120.
  • Rubinius is no longer supported.

Version 1.2.7 - 2-Apr-2020

  • Fixed 'wrong number of arguments' errors when running on JRuby 9.0. #114.
  • Fixed warnings when running on Ruby 2.8. #112.

Version 1.2.6 - 24-Dec-2019

  • Timezone#strftime('%s', time) will now return the correct number of seconds since the epoch. #91.
  • Removed the unused TZInfo::RubyDataSource::REQUIRE_PATH constant.
  • Fixed "SecurityError: Insecure operation - require" exceptions when loading data with recent Ruby releases in safe mode.
  • Fixed warnings when running on Ruby 2.7. #106 and #111.

Version 1.2.5 - 4-Feb-2018

... (truncated)

Commits
  • 2dc46fd Preparing v1.2.11.
  • c854e6a Update copyright years.
  • 9c092f3 Eliminate Object#untaint deprecation warnings on JRuby 9.4.0.0.
  • 4e5f8b7 Add Ruby 3.1, 3.2 and JRuby 9.4.
  • 2f58c69 Update the dependency on actions/checkout.
  • e52c056 Revert "Workaround for 'Permission denied - NUL' errors with JRuby on Windows."
  • 0814dcd Fix the release date.
  • fd05e2a Preparing v1.2.10.
  • b98c32e Merge branch 'fix-directory-traversal-1.2' into 1.2
  • ac3ee68 Remove unnecessary escaping of + within regex character classes.
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the Security Alerts page.

dependabot[bot] avatar Oct 07 '25 19:10 dependabot[bot]